Data Analysis Essays (Examples)

Studyspark

Study Document Study Document

CFOs Big Data Opportunities In Firms

Pages: 7 (2057 words) Sources: 6 Document Type:Research Paper Document #:26742092

Introduction
The growth of big data has had significant transformative effects on several industries including technology, agriculture, health, education, and finance. Over the past decade, the number of humans … finance. Over the past decade, the number of humans using smartphones has increased tremendously and this has created a big pool of user data as smartphone users stamp their digital footprint all over the web. The electronic data collected as a result of these activities yield Big data that provide valuable insights to decision-makers looking for data points to inform their decision processes. The growth of Big data has necessitated the development of computer algorithms and tools that can analyze the data at scale. Good analysis and interpretation of the data allow organizations to ‘co-create’ solutions alongside their target users and create new value that is highly tailored to the needs of the market … the needs of the market……

References

References

Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS quarterly, 36(4).

Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance and challenges of big data research. Big Data Research, 2(2), 59-64.

Joshi, N. (2018). How Big Data Can Transform the Finance Industry. Retrieved October 7, 2019, from  https://www.bbntimes.com/en/technology/big-data-is-transforming-the-finance-industry .

Nath, T. I. (2019). How Big Data Has Changed Finance. Retrieved October 7, 2019, from  https://www.investopedia.com/articles/active-trading/040915/how-big-data-has-changed-finance.asp .

Turner, D., Schroeck, M., & Shockley, R. (2013). Analytics: The real-world use of big data in financial services. IBM Global Business Services, 27.

Yin, S., & Kaynak, O. (2015). Big data for modern industry: challenges and trends [point of view]. Proceedings of the IEEE, 103(2), 143-146.

Zhou, K., Fu, C., & Yang, S. (2016). Big data driven smart energy management: From big data to big insights. Renewable and Sustainable Energy Reviews, 56, 215-225.

Studyspark

Study Document Study Document

Data Security Using RFID Bands At Music Festivals

Pages: 5 (1616 words) Sources: 6 Document Type:Essay Document #:97930410

… RFID is the new technological method for quick identification of the user, especially if used for public events like music festivals. It makes data management easier, so that information about the attendees is managed technically by capturing data from scanners and transmitting it to the computer without the user's physical contact. This paper is about managing adult attendees at music festivals … and credit/debit bank cards. The following sections would probe into its compliance issues and the related regulations that would impact the planned implementation.
analysis
Description of the Chosen Use Case
RFID wrist bands would be used for managing adult attendees at a music festival at a hotel … activities with the attendees' check-in function, enabling the event's enhanced promotion value-added marketing potential.
Description of Five or More Types of Personal/Private Information data That Will Be Collected, Stored, Processed With the Use Case
The type of data collected……

References

References

Event Tribe. (n.a.). The top 10 benefits of using RFID for events. Retrieved from  https://www.eventbrite.com/blog/academy/the-top-10-benefits-of-using-rfid-for-events/ 

ID&C. (n.a.). How to RFID wristbands work? Retrieved from  https://www.idcband.com/blog/how-do-rfid-wristbands-work/ 

Kacicki, T. (2019, July 15). 4 commonly overlooked facts about RFID wristbands. Intellitix. Retrieved from  https://intellitix.com/hub/four-commonly-overlooked-facts-rfid 

OECD. (2008). OECD policy guideline on RFID.  https://www.oecd.org/sti/ieconomy/40892347.pdf 

Quirk, R.E. & Borrello, S.J. (2005). RFID: Rapid deployment and regulatory challenges. Retrieved from  https://www.pharmamanufacturing.com/assets/Media/MediaManager/VenableRFIDpaper.pdf?SESSID=62935cf41f5a19909f5bb3ae3a598490 

Williamson, A., Tsay, L., Kateeb, I.A. & Burton, L. (2013). Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia, 4, 282-287. DOI: 10.1016/j.aasri.2013.10.042

Studyspark

Study Document Study Document

Twitter External Internal Analysis Report To CEO

Pages: 15 (4857 words) Sources: 1 Document Type:Essay Document #:23822356

Appendix
External analysis
1. PESTEL analysis
1.1. Political
1.1.1.Global leaders use of social media impacts the political landscape and is able to influence operations. (C-142)
1.1.2. Several high-profile world … the political climate in various countries, governments may censor content and access to social media platforms.
1.2. Economics
1.2.1. Generated revenues through advertising, data licensing and other products. products. In 2017, total revenue generated was $2,443, 299, 000 (C-142)
1.2.2. Fluctuating exchange rates and inflation rates can … like India and Indonesia. It is estimated that India has 270 million Facebook users while Indonesia has 140 million (C-143)
1.5. Ecological
1.5.1. data centres require electricity and total energy use is increasing. (C-142)
1.5.2. In order to access social media, mobile phones and laptops are often … without reason raises issues of unethical behaviour. Users also believe it contradicts the platform that is supposedly focused on free speech. (C-147)
1.6.2. data……

References

References

Thompson, Arthur A.,. (2015). Crafting and Executing Strategy: Concepts and Readings..New York: McGraw-Hill Education, (pp. 138-148)

Studyspark

Study Document Study Document

Hepatitis B Virus Infection

Pages: 5 (1453 words) Sources: 8 Document Type:Essay Document #:69592273

… disease, determinants of health relating to its development, epidemiological triad, and role of the nurse practitioner in the management of the infectious disease.
analysis of the Communicable Disease
The World Health Organization (2019) defines hepatitis B virus as a viral infection that attacks the liver and has ……

References

References

American Association of Nurse Practitioners. (2019, January 28). Nurse Practitioner Role Grows to More Than 270,000. Retrieved July 23, 2020, from https://www.aanp.org/news-feed/nurse-practitioner-role-continues-to-grow-to-meet-primary-care-provider-shortages-and-patient-demands

Greene, K.M., Duffus, W.A., Xing, J., & King, H. (2017). Social Determinants of Health Associated with HBV Testing and Access to Care among Foreign-born Persons Residing in the United States: 2009-2012. Journal of Health Disparities Research and Practice, 10(2), 1-20.

Healthy People. (2020). Determinants of Health. Retrieved from U.S. Department of Health and Human Services website:  https://www.healthypeople.gov/2020/about/foundation-health-measures/Determinants-of-Health 

Kim, H. & Kim, W.R. (2018, August 22). Epidemiology of Hepatitis B Virus Infection in the United States. Clinical Liver Disease, 12(1), 1-4.

Kim, W.R. (2012, March 1). Epidemiology of Hepatitis B in the United States. Hepatology, 49(5), S28-S34.

MacLachlan, J.H. & Cowie, B.C. (2015, May). Hepatitis B Virus Epidemiology. Cold Spring Harbor Perspectives in Medicine, 5(5). doi: 10.1101/cshperspect.a021410

World Health Organization. (2019, July 18). Hepatitis B. Retrieved July 23, 2020, from https://www.who.int/news-room/fact-sheets/detail/hepatitis-b

Zhang, Z., Wang, C., Liu, Z., Zou, G., Li, J. & Lu, M. (2019, August 13). Host Genetic Determinants of Hepatitis B Virus Infection. Frontiers in Genetics, 10(696),1-24.

Studyspark

Study Document Study Document

Traumatic Stress In Age Of COVID 19 Student Teacher Syllabus

Pages: 9 (2722 words) Sources: 2 Document Type:Article Review Document #:56613298

… in general knowledge about its trauma-specific consequences and its management from existing and well-documented management approaches. Thus, the study involved a review and analysis of the steps and directions observed from existing studies to point in the next expected area of research interest.
Result
This section discusses … This paper also found the current method of classifying and diagnosing traumatic stress as a negative health consequence of COVID-19, based on self-report data to be faulty. Based on this finding, new approaches for improving such diagnosis and data collection are recommended for investigation. The aspect of prevention focuses on the empirical findings from reviewed studies about PTSD. The main recommendations from ……

References

References

Richmond, A., Slattery, J., Mitchell, N., & Morgan, R. (2016). Can a learner-centered syllabus change students’ perceptions of student-professor rapport and master teacher behaviors? Scholarship of Teaching and Learning in Psychology, 2(3), 159-168.

Saville, B. K., Zinn, T. E., Brown, A. R., & Marchuk, K. A. (2010). Syllabus Detail and Students’ Perceptions of Teacher Effectiveness. Teaching of Psychology, 37(3), 186–189. DOI:10.1080/00986283.2010.488523 

Harrington, C. M., & Gabert-Quillen, C. A. (2015). Syllabus length and use of images: An empirical investigation of student perceptions. Scholarship of Teaching and Learning in Psychology, 1(3), 235.

Wilson, J. H., & Ryan, R. G. (2013). Professor–student rapport scale: Six items predict student outcomes. Teaching of Psychology, 40(2), 130-133.

Cullen, R., & Harris, M. (2009). Assessing learner?centredness through course syllabi. Assessment & Evaluation in Higher Education, 34(1), 115-125.

 

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish … enhances intelligence gathering. While the study provides significant insights on this topic, future studies should examine the issue based on empirical or primary data.
Keywords: cyber espionage, acceptability, state behavior, cyberattacks, relationship, intelligence gathering, national security, cyber warfare, cyber capabilities.
Introduction
Cyberspace has become an important element … as Iranian Hackers, UK Says”, Financial Times, 2019. https://www.ft.com/content/b947b46a-f342-11e9-a79c-bc9acae3b654]
Theme #3: Cyber espionage enhances intelligence gathering
The third emerging theme or pattern in data is the idea that cyber espionage enhances intelligence gathering capabilities of nation-states. Improvements in intelligence gathering is linked to the changing nature of … improve……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).

Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).

Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017.  https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf 

Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.

Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015.  http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… 10
2.4.3 Scalability and Flexibility 11
2.4.4 Security 11
2.4.5 Energy Efficiency 11
3 Methodology 12
3.1 Research Approach and Design 12
3.2 data Collection Sources & Selection Plan 12
3.3 Proposed Interview Questions 13
3.4 Sample Population 13
3.5 Ethical Considerations 14
3.6 data analysis Plan & Rationale 15
4 Contributions to Theory or Practice and their Significance 16
5 Ethical Issues and Methods to Address 17
6 … IT structures can preclude an accounting organization’s capability of conducting business operations productively, cloud computing can facilitate a greater level of control and data backup, security accessibilities and also enables the accounting enterprises in business diversification. Numerous accounting organizations are shifting towards cloud computing owing to the … cloud computing services to an accounting organization in terms of cost-effectiveness.
Methodology
The qualitative approach will be utilized in the research study. The data employed for this research study will be……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… operate their businesses, and current trends indicate that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already … literature in chapter two. Chapter three provides a detailed description of the study’s qualitative methodology and chapter four presents the results of the data analysis. Finally, chapter fives provide a summary of the research together with answers to the study’s guiding research questions and subquestions.
The Implementation of … guiding Unified Theory of Acceptance and Use of Technology theoretical/conceptual framework followed by an overview of the Internet of Things (IoT) and an analysis of current trends that are having an impact on its proliferation. In addition, an examination of the risks that are associated with the … impact on its proliferation.……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Policy On Shift Swapping

Pages: 6 (1887 words) Sources: 2 Document Type:Essay Document #:36684700

… denied on the premise that the employee was shift swapping when he got injured and not clocked in under his own name. Document analysis of the scenario shows that the current shift assignment and shift swapping policy has contributed to the issue. Some full-time employees have capitalized ……

References

References

Bowen, G.A. (2009). Document Analysis as a Qualitative Research Method. Qualitative Research Journal, 9(2), 27-40. DOI: 10.3316/QRJ0902027

Disselkamp, L. (Ed.). (2013). Workforce Asset Management Book of Knowledge. Hoboken, NJ: John Wiley & Sons.

Golden, L. (2015, April 9). Irregular Work Scheduling and Its Consequences. Retrieved May 20, 2020, from  https://www.epi.org/publication/irregular-work-scheduling-and-its-consequences/ 

Paychex. (2019, November 13). How to Manage and Minimize Trading Shifts at Work. Retrieved May 12, 2020, from  https://www.paychex.com/articles/payroll-taxes/how-to-manage-and-minimize-trading-shifts-at-work 

Studyspark

Study Document Study Document

School Uniforms

Pages: 5 (1474 words) Sources: 5 Document Type:Essay Document #:15058485

… Likert-type questions, and multiple choice questions. Students’ responses to Likert-type questions will be rated on a scale of 1 to 5. The two data collection instruments are suitable for the study since they will help generate qualitative and quantitative data that can be analyzed to draw relevant conclusions on the issue.
Proposed data analysis Method
The proposed data analysis techniques for this study are triangulation and statistical analyses. Triangulation will be carried out on qualitative data to generate qualitative codes based on emerging themes and patterns. The codes will then be entered into a statistical analysis software alongside quantitative data to generate a single comprehensive data. The integrated data will be analyzed using statistical software SPSS version 2.0 to generate findings and relevant conclusions on the phenomenon being studied.
In conclusion, the … learning environment in relation to student achievement. Mixed methods research design will be utilized for this……

References

References

Adams, B.J. (2007, May 2). The Effectiveness of School Uniforms on Students’ Academic Achievement and Overall Classroom Behavior. Retrieved from Rowan University website:  https://rdw.rowan.edu/cgi/viewcontent.cgi?article=1769&context=etd 

Creswell, J.W. (2014). Research design: Qualitative, quantitative and mixed methods approaches (4th ed.). Thousand Oaks, CA: SAGE Publications Inc.

DeMitchell, T.A. (2015, December 15). Does Wearing a School Uniform Improve Student Behavior? Retrieved October 19, 2019, from  http://theconversation.com/does-wearing-a-school-uniform-improve-student-behavior-51553 

Ordway, D. (2018, April 20). School Uniforms: Do They Really Improve Student Achievement, Behavior? Retrieved October 19, 2019, from  https://journalistsresource.org/studies/society/education/school-uniforms-research-achievement/ 

Sanchez, J. (2013, April 23). College of Education Researchers Conduct Study on Impacts of School Uniform. Retrieved from University of Nevada, Reno website:  https://www.unr.edu/nevada-today/news/2013/school-uniform-study 

Join thousands of other students and

"spark your studies".